咨询与建议

限定检索结果

文献类型

  • 1,158 篇 会议
  • 32 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 879 篇 工学
    • 650 篇 计算机科学与技术...
    • 455 篇 软件工程
    • 240 篇 控制科学与工程
    • 159 篇 电气工程
    • 118 篇 信息与通信工程
    • 115 篇 机械工程
    • 56 篇 动力工程及工程热...
    • 46 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 39 篇 生物工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 生物医学工程(可授...
    • 31 篇 仪器科学与技术
    • 24 篇 网络空间安全
    • 21 篇 光学工程
    • 19 篇 力学(可授工学、理...
    • 18 篇 化学工程与技术
  • 281 篇 理学
    • 162 篇 数学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 49 篇 生物学
    • 49 篇 系统科学
    • 33 篇 化学
  • 174 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 31 篇 医学
    • 30 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 20 篇 法学
    • 15 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 14 篇 教育学
  • 6 篇 农学
  • 1 篇 军事学

主题

  • 49 篇 control systems
  • 42 篇 computer science
  • 27 篇 real-time system...
  • 23 篇 access control
  • 21 篇 monitoring
  • 20 篇 hardware
  • 20 篇 mathematical mod...
  • 18 篇 process control
  • 17 篇 computational mo...
  • 16 篇 computer archite...
  • 16 篇 sensors
  • 15 篇 artificial intel...
  • 14 篇 software enginee...
  • 14 篇 smart cities
  • 14 篇 servers
  • 14 篇 software
  • 13 篇 neural networks
  • 13 篇 feature extracti...
  • 13 篇 equations
  • 13 篇 vehicles

机构

  • 10 篇 univ politehn bu...
  • 9 篇 computer science...
  • 7 篇 univ politehn bu...
  • 7 篇 college of compu...
  • 6 篇 three gorges int...
  • 6 篇 state key labora...
  • 5 篇 faculty of autom...
  • 4 篇 rudn univ people...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 faculty of compu...
  • 3 篇 division of elec...
  • 3 篇 department of sy...
  • 3 篇 department of el...
  • 3 篇 delft univ techn...
  • 3 篇 school of comput...
  • 3 篇 china three gorg...
  • 3 篇 department of au...
  • 3 篇 peter great st p...
  • 3 篇 chinese acad sci...

作者

  • 5 篇 li xiaokun
  • 4 篇 andrade rossana ...
  • 4 篇 yuan ye
  • 4 篇 nicolae tapus
  • 4 篇 wang haoran
  • 4 篇 wu hao
  • 4 篇 y. dote
  • 4 篇 guo xiwang
  • 4 篇 sterca adrian
  • 4 篇 qi liang
  • 4 篇 lucia vacariu
  • 4 篇 wang jiacun
  • 4 篇 smits aletta
  • 4 篇 detweiler chris
  • 4 篇 bartels ester
  • 3 篇 li weiling
  • 3 篇 vescan andreea
  • 3 篇 andrzej napieral...
  • 3 篇 mariana mocanu
  • 3 篇 octavian cret

语言

  • 1,174 篇 英文
  • 13 篇 其他
  • 10 篇 中文
  • 3 篇 俄文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science, CSCS 2013"
1200 条 记 录,以下是1061-1070 订阅
排序:
Real-time simulation for continuous processing of an electrolytic tinning line
Real-time simulation for continuous processing of an electro...
收藏 引用
international conference on Industrial Electronics, control and Instrumentation
作者: Eung-Seok Kim Joon-Soo Lee Hyun-Sik Ahn Young-Jo Cho Sang-Rok Oh Ick Choy Kwang-Bae Kim Hai-Won Yang Control Systems Lab Korea Institute of Science and Technology Seoul South Korea Department of Electronics Eng Kookmin University Seoul South Korea Department of Electrical Eng Hanyang University Seoul South Korea
In this paper, a real-time simulation is performed to insure the continuous processing of an electrolytic tinning line (ETL). An ETL is modelled mathematically and a simple type of tension and speed controllers are de... 详细信息
来源: 评论
On the Tensor Product based qLPV modeling of Bio-inspired Dynamic Processes
On the Tensor Product based qLPV modeling of Bio-inspired Dy...
收藏 引用
IEEE international conference on Intelligent Engineering systems
作者: Peter Galambos Jozsef Kuti Peter Baranyi Institute for Computer Science and Control Hungarian Academy of Sciences Department of Manufacturing Science and Technology Budapest University of Technology and Economics
A recently published definition of Cognitive control draws twofold sense to characterize the main point of this new scientific field. On the one hand, Cognitive control aims to apply the results of control theory to r... 详细信息
来源: 评论
StegFS: a steganographic file system
StegFS: a steganographic file system
收藏 引用
international conference on Data Engineering
作者: H. Pang K.-L. Tan X. Zhou Laboratories for Information Technology Singapore Department of Computer Science National University of Singapore Singapore
While user access control and encryption can protect valuable data from passive observers, those techniques leave visible ciphertexts that are likely to alert an active adversary to the existence of the data, who can ... 详细信息
来源: 评论
A Path to Holistic Privacy in Stream Processing systems  23
A Path to Holistic Privacy in Stream Processing Systems
收藏 引用
21st Annual international conference on Mobile systems, Applications and Services, MobiSys 2023
作者: Fomichev, Mikhail Technical University of Darmstadt Germany
the massive streams of Internet of things (IoT) data require a timely analysis to retain data usefulness. Stream processing systems (SPSs) enable this task, deriving knowledge from the IoT data in real-time. Such real... 详细信息
来源: 评论
Software defined network based adaptive routing for data replication in Data Centers
Software defined network based adaptive routing for data rep...
收藏 引用
IEEE international conference on Networks
作者: Renuga Kanagavelu Bu Sung Lee Rodel Felipe Miguel Le Nguyen the Dat Luke Ng Mingjie A*STAR(Agency for Science and Technology) Data Storage Institute Singapore School of Computer Engineering Nanyang Technological University Singapore
Data availability is a major challenge faced by today's Data Centers where a large number of high performance servers are organized into racks interconnected by a switching network. Data replication is an effectiv... 详细信息
来源: 评论
A gain adaptive scheme for the generalised predictive control of an air-handling plant
A gain adaptive scheme for the generalised predictive contro...
收藏 引用
international conference on Industrial Electronics, control and Instrumentation
作者: Guang Geng G.M. Geary School of Engineering and Computer Science University of Durham Durham UK
this paper describes a gain-adaptive scheme developed for the generalised predictive control of an air-handling plant. CARMA models are used to generate j-step-ahead predictions of the process output instead of the mo... 详细信息
来源: 评论
CyRRA: Cyberattack Resilient Robotic Arm
CyRRA: Cyberattack Resilient Robotic Arm
收藏 引用
IEEE India conference (INDICON)
作者: Souparna Saha Sahaj Saxena Sajal Bhatia Electrical and Instrumentation Engineering Department Thapar Institute of Engineering and Technology Patiala Punjab India School of Computer Science and Engineering Sacred Heart University Fairfield Connecticut USA
Introduction of the internet-based interconnections among the physical control systems has given rise to more complex process algorithms, and it is necessary to safeguard such systems from cyber attacks that specifica... 详细信息
来源: 评论
Using Chernoff's bounding method for high-performance structural break detection and forecast error reduction
Using Chernoff's bounding method for high-performance struct...
收藏 引用
8th international conference on Informatics in control, Automation and Robotics, ICINCO 2011
作者: Pauli, Dirk Lorion, Yann Feller, Sebastian Rupp, Benjamin Timm, Ingo J. Information Systems and Simulation Institute of Computer Science Goethe-University Frankfurt P.O. Box 11 19 32 60054 Frankfurt/Main Germany FCE Frankfurt Consulting Engineers GmbH Frankfurter Str.5 65239 Hochheim/Main Germany Department IV Institute of Business Information Systems University of Trier 54286 Trier Germany
In this paper, a new method for detecting multiple structural breaks, i.e. undesired changes of signal behavior, is presented and applied to artificial and real-world data. It will be shown how Chernoff Bounds can be ... 详细信息
来源: 评论
Industry feedback on skills and knowledge in real-time software engineering
Industry feedback on skills and knowledge in real-time softw...
收藏 引用
EAEEIE Annual conference,
作者: Adam Pilat Andrew J. Kornecki Jean-Marc thiriet Wojciech Grega Miroslav Sveda AGH University of Science and Technology Poland Embrey-Riddle Aeronautical University USA Grenoble Université France Brno University of Technology Czech Republic
Rapid progress of computing technologies is the major reason that the programs like electronics, computer and software engineering, robotics and control engineering need continuous updates. this paper is related to th... 详细信息
来源: 评论
Consensus-Based Algorithms for controlling Swarms of Unmanned Aerial Vehicles  19th
Consensus-Based Algorithms for Controlling Swarms of Unmann...
收藏 引用
19th international conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020
作者: Carli, Raffaele Cavone, Graziana Epicoco, Nicola Di Ferdinando, Mario Scarabaggio, Paolo Dotoli, Mariagrazia Department of Electrical and Information Engineering Polytechnic of Bari Bari Italy Center of Excellence DEWS Department of Information Engineering Computer Science and Mathematics University of L’Aquila L’Aquila Italy
Multiple Unmanned Aerial Vehicles (multi-UAVs) applications are recently growing in several fields, ranging from military and rescue missions, remote sensing, and environmental surveillance, to meteorology, logistics,... 详细信息
来源: 评论